generated/google/apis/secretmanager_v1/classes.rb in google-api-client-0.39.3 vs generated/google/apis/secretmanager_v1/classes.rb in google-api-client-0.39.4

- old
+ new

@@ -31,11 +31,11 @@ # Corresponds to the JSON property `name` # @return [String] attr_accessor :name # A secret payload resource in the Secret Manager API. This contains the - # sensitive secret data that is associated with a SecretVersion. + # sensitive secret payload that is associated with a SecretVersion. # Corresponds to the JSON property `payload` # @return [Google::Apis::SecretmanagerV1::SecretPayload] attr_accessor :payload def initialize(**args) @@ -52,11 +52,11 @@ # Request message for SecretManagerService.AddSecretVersion. class AddSecretVersionRequest include Google::Apis::Core::Hashable # A secret payload resource in the Secret Manager API. This contains the - # sensitive secret data that is associated with a SecretVersion. + # sensitive secret payload that is associated with a SecretVersion. # Corresponds to the JSON property `payload` # @return [Google::Apis::SecretmanagerV1::SecretPayload] attr_accessor :payload def initialize(**args) @@ -546,14 +546,17 @@ # A `Policy` is a collection of `bindings`. A `binding` binds one or more # `members` to a single `role`. Members can be user accounts, service accounts, # Google groups, and domains (such as G Suite). A `role` is a named list of # permissions; each `role` can be an IAM predefined role or a user-created # custom role. - # Optionally, a `binding` can specify a `condition`, which is a logical - # expression that allows access to a resource only if the expression evaluates - # to `true`. A condition can add constraints based on attributes of the - # request, the resource, or both. + # For some types of Google Cloud resources, a `binding` can also specify a + # `condition`, which is a logical expression that allows access to a resource + # only if the expression evaluates to `true`. A condition can add constraints + # based on attributes of the request, the resource, or both. To learn which + # resources support conditions in their IAM policies, see the + # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource- + # policies). # **JSON example:** # ` # "bindings": [ # ` # "role": "roles/resourcemanager.organizationAdmin", @@ -564,11 +567,13 @@ # "serviceAccount:my-project-id@appspot.gserviceaccount.com" # ] # `, # ` # "role": "roles/resourcemanager.organizationViewer", - # "members": ["user:eve@example.com"], + # "members": [ + # "user:eve@example.com" + # ], # "condition": ` # "title": "expirable access", # "description": "Does not grant access after Sep 2020", # "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z') # ", @@ -642,10 +647,13 @@ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows # you to overwrite a version `3` policy with a version `1` policy, and all of # the conditions in the version `3` policy are lost. # If a policy does not include any conditions, operations on that policy may # specify any valid version or leave the field unset. + # To learn which resources support conditions in their IAM policies, see the + # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource- + # policies). # Corresponds to the JSON property `version` # @return [Fixnum] attr_accessor :version def initialize(**args) @@ -755,11 +763,11 @@ @replication = args[:replication] if args.key?(:replication) end end # A secret payload resource in the Secret Manager API. This contains the - # sensitive secret data that is associated with a SecretVersion. + # sensitive secret payload that is associated with a SecretVersion. class SecretPayload include Google::Apis::Core::Hashable # The secret data. Must be no larger than 64KiB. # Corresponds to the JSON property `data` @@ -828,14 +836,17 @@ # A `Policy` is a collection of `bindings`. A `binding` binds one or more # `members` to a single `role`. Members can be user accounts, service accounts, # Google groups, and domains (such as G Suite). A `role` is a named list of # permissions; each `role` can be an IAM predefined role or a user-created # custom role. - # Optionally, a `binding` can specify a `condition`, which is a logical - # expression that allows access to a resource only if the expression evaluates - # to `true`. A condition can add constraints based on attributes of the - # request, the resource, or both. + # For some types of Google Cloud resources, a `binding` can also specify a + # `condition`, which is a logical expression that allows access to a resource + # only if the expression evaluates to `true`. A condition can add constraints + # based on attributes of the request, the resource, or both. To learn which + # resources support conditions in their IAM policies, see the + # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource- + # policies). # **JSON example:** # ` # "bindings": [ # ` # "role": "roles/resourcemanager.organizationAdmin", @@ -846,10 +857,12 @@ # "serviceAccount:my-project-id@appspot.gserviceaccount.com" # ] # `, # ` # "role": "roles/resourcemanager.organizationViewer", - # "members": ["user:eve@example.com"], + # "members": [ + # "user:eve@example.com" + # ], # "condition": ` # "title": "expirable access", # "description": "Does not grant access after Sep 2020", # "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z') # ",